Description
In the Linux kernel, the following vulnerability has been resolved: libceph: define and enforce CEPH_MAX_KEY_LEN When decoding the key, verify that the key material would fit into a fixed-size buffer in process_auth_done() and generally has a sane length. The new CEPH_MAX_KEY_LEN check replaces the existing check for a key with no key material which is a) not universal since CEPH_CRYPTO_NONE has to be excluded and b) doesn't provide much value since a smaller than needed key is just as invalid as no key -- this has to be handled elsewhere anyway.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 6405e8c680974bb74e2c98d5249fb52c7b12a6c6
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8d745d38c88ecbed95f6b2b39857bf89f35a3244
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e1dc45d97975f9db65694d234fbddf1915176e16
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1b275bd49e58752efb83767a5d1aed41356c5e64
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before c1a0f5f1e5e7e98c36a362ec3d1fcfd9932931ed
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d82467c07b03a27c3c5469b62bb3b726305a80bb
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ac431d597a9bdfc2ba6b314813f29a6ef2b4a3bf
5.15.202 (semver)
6.1.165 (semver)
6.6.128 (semver)
6.12.75 (semver)
6.18.16 (semver)
6.19.6 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/6405e8c680974bb74e2c98d5249fb52c7b12a6c6
git.kernel.org/...c/8d745d38c88ecbed95f6b2b39857bf89f35a3244
git.kernel.org/...c/e1dc45d97975f9db65694d234fbddf1915176e16
git.kernel.org/...c/1b275bd49e58752efb83767a5d1aed41356c5e64
git.kernel.org/...c/c1a0f5f1e5e7e98c36a362ec3d1fcfd9932931ed
git.kernel.org/...c/d82467c07b03a27c3c5469b62bb3b726305a80bb
git.kernel.org/...c/ac431d597a9bdfc2ba6b314813f29a6ef2b4a3bf